[+] Stacs analysis of firmware for password hashes



[*] STACS log:
2023-07-23 10:18:34,645 - 1974190 - [INFO] STACS running with 10 threads
2023-07-23 10:18:34,645 - 1974190 - [INFO] STACS uses libarchive (licenses may be found at https://github.com/libarchive/libarchive/blob/master/COPYING)
2023-07-23 10:18:34,645 - 1974190 - [INFO] STACS uses yara (licenses may be found at https://github.com/VirusTotal/yara-python/blob/master/LICENSE)
2023-07-23 10:18:34,645 - 1974190 - [INFO] Attempting to load rule pack from /external/stacs-rules/credential.json
2023-07-23 10:18:34,662 - 1974190 - [INFO] Using cache directory at /tmp/1690096714662308
2023-07-23 10:18:34,662 - 1974190 - [INFO] Attempting to get a list of files to scan from /logs/firmware
2023-07-23 10:18:35,002 - 1974190 - [INFO] Found 2050 files for analysis
2023-07-23 10:18:41,431 - 1974190 - [INFO] Generating SARIF from findings
2023-07-23 10:18:41,432 - 1974190 - [INFO] Found 5 findings

[+] Found 5 credential areas:
[+] PATH: /unblob_extracted/firmware_extract/1568982-13971496.squashfs_v4_le_extract/etc/nginx/certs/default/key	-	Hash: "-----BEGINRSAPRIVATEKEY-----MIIEowIBAAKCAQEA7UIEN7b".
[+] PATH: /unblob_extracted/firmware_extract/1568982-13971496.squashfs_v4_le_extract/etc/shadow	-	Hash: "root:$1$ZMDCdK26$t9H/47MjUhJU5xYl46PVM.:17366:0:99999:7:::".
[+] PATH: /unblob_extracted/firmware_extract/1568982-13971496.squashfs_v4_le_extract/etc/shadow	-	Hash: "sdcard:$1$JbElAA7t$JzppsspcGk.BRuKFyFj2A0:17360:0:99999:7:::".
[+] PATH: /unblob_extracted/firmware_extract/1568982-13971496.squashfs_v4_le_extract/etc/shadow	-	Hash: "$1$ZMDCdK26$t9H/47MjUhJU5xYl46PVM.".
[+] PATH: /unblob_extracted/firmware_extract/1568982-13971496.squashfs_v4_le_extract/etc/shadow	-	Hash: "$1$JbElAA7t$JzppsspcGk.BRuKFyFj2A0".

[*] Found 5 password hashes.